The impact of inheritance on security in object- oriented database systems
Author : David L. Spooner
Publisher :
Page : 11 pages
File Size : 13,37 MB
Release : 1988
Category :
ISBN :
Author : David L. Spooner
Publisher :
Page : 11 pages
File Size : 13,37 MB
Release : 1988
Category :
ISBN :
Author : David L. Spooner
Publisher : Springer
Page : 398 pages
File Size : 48,72 MB
Release : 2016-01-09
Category : Computers
ISBN : 0387349324
This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.
Author : B. Thuraisingham
Publisher : Springer
Page : 382 pages
File Size : 12,26 MB
Release : 2005-12-15
Category : Computers
ISBN : 030647008X
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.
Author : Yves Deswarte
Publisher : Springer
Page : 445 pages
File Size : 46,74 MB
Release : 2006-04-10
Category : Computers
ISBN : 3540474889
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.
Author : Ellen Mnushkin
Publisher :
Page : 346 pages
File Size : 21,26 MB
Release : 1992
Category :
ISBN :
"We describe the relational algebra implementation of all the modifications to the relational operators necessary to accommodate the object-oriented features mentioned above. New syntax is suggested when these modifications are not sufficient." --
Author : Bhavani Thuraisingham
Publisher : Springer Science & Business Media
Page : 237 pages
File Size : 29,80 MB
Release : 2013-06-29
Category : Computers
ISBN : 1447138589
This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of issues, relating to both mandatory and discretionary security, including security facilities of PCTE, information flow control, the design of multilevel secure data models, and secure database interoperation via role translation. The resulting volume provides a comprehensive overview of current work in this important area of research.
Author : Carl E. Landwehr
Publisher : North Holland
Page : 430 pages
File Size : 39,36 MB
Release : 1992
Category : Computers
ISBN :
This volume presents an in-depth discussion of the current state of research and practice in database security, including a record of discussions concerning that research. It is offered both to document progress and to provide researchers with a broad perspective of recent developments. The volume also contains a preview of coming security issues in medical information systems, and a summary of the IFIP WG 11.3 meeting which was held following the conference. Faculty and advanced students in the area of database security research and development and industrial researchers should find this proceedings volume of interest.
Author : Jean-Jacques Quisquater
Publisher : Springer Science & Business Media
Page : 398 pages
File Size : 24,55 MB
Release : 1998-09-02
Category : Business & Economics
ISBN : 9783540650041
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.
Author : Joachim Biskup
Publisher :
Page : 426 pages
File Size : 48,21 MB
Release : 1994
Category : Computers
ISBN : 9780444819765
The current state of database security research and practice is explored in this volume. Contributions are sourced from a wide range of international specialists involved in the field, ensuring a comprehensive cross-fertilization of ideas. Progress achieved in the following areas is given particular emphasis: user groups and roles; database architecture; inference analysis and control; database models; queries, updates and transactions; policy modelling; access control and application design. Invited papers provide a perspective on the implications of security in health care systems, plus current trends in database technology and their impact on security concepts.
Author : Carl E. Landwehr
Publisher : North Holland
Page : 300 pages
File Size : 19,5 MB
Release : 1989
Category : Computers
ISBN :
This second volume reports research and development results in the area of database security. Topics discussed include the development of a proper framework for stating database system security requirements, and particularly how the notion of roles can best be applied. The application of object-oriented database systems to enforce security requirements stated in terms of role authorizations appears to be a promising avenue for further work. Characterization and control of the problems of aggregation and inference have also been the subject of considerable effort and some progress. The utility of establishing a common problem framework for testing proposed solutions to database security problems is also recognized. The group tentatively agreed to use a hypothetical database of medical information for this purpose, since this application can involve complex yet intuitive requirements for secrecy, integrity, and availability. Such a database could require controlling access authorizations for a variety of roles including those of patients, doctors, nurses, pharmacists, epidemiological researchers, and insurers. Contents: Policy and Models. Security Models and Enterprise Models (J.E.